A key purpose of the @RISK is to provide the data that will ensure that the 20 Critical Controls (the US and UK benchmark for effective protection of networked systems) continue to be the most effective defenses for all known attack vectors. But since it is also valuable for security practitioners, SANS is making it available to the 145,000 security practitioners who have completed SANS security training and others at their organizations who hope to stay current with the offensive methods in use.

TOP VULNERABILITY THIS WEEK: PHPMailer and SwiftMailer Updated to Resolve Code Execution Flaw After First Patch Deemed Insufficient

******************** Sponsored By Skycure ********************

2016 was a fully-packed year for mobile security, with the first major public exposure of sophisticated state-sponsored cyber espionage, and the evolution of mobile spyware technology for corporate espionage. Get the post-mortem on the top mobile threats from 2016 and learn about mobile security predictions for 2017. Register for live webinar: http://www.sans.org/info/191252

--SANS Brussels Winter 2017 | January 16-21, 2017 | Brussels, Belgium | Choose from five courses, all led by a SANS Instructor and each with an associated GIAC certification. Training takes pace in the Radisson Blu Royal, situated close to Brussels' De Brouckere metro station.
http://www.sans.org/u/n2K

Title: PHPMailer and SwiftMailer Updated to Resolve Code Execution Flaw After First Patch Deemed Insufficient
Description: PHPMailer and SwiftMailer have released updates to address a vulnerability that was identified by Dawid Golunski of Legal Hackers. PHPMailer and SwiftMailer had released an update to address CVE-2016-10033, a arbitrary code execution vulnerability that could be exploited remotely. However, it was found that the patch was insufficient. In response, PHPMailer and Swiftmailer released another update to address CVE-2016-10045. Administrators who manage servers or applications that relied on these libraries should update their systems.
Reference: https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html

This is a list of recent vulnerabilities for which exploits are
available. System administrators can use this list to help in
prioritization of their remediation activities. The Qualys Vulnerability
Research Team compiles this information based on various exploit
frameworks, exploit databases, exploit kits and monitoring of internet
activity.

ID: CVE-2016-7892
Title: Adobe Flash Player Use-After-Free Code Execution Vulnerability
Vendor: Adobe
Description: Remote exploitation of a use-after-free vulnerability in Adobe's Flash Player could allow attackers to execute arbitrary code. Adobe is aware of a report that an exploit for CVE-2016-7892 exists in the wild, and is being used in limited targeted attacks.
CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

(c) 2017. All rights reserved. The information contained in this
newsletter, including any external links, is provided "AS IS," with no
express or implied warranty, for informational purposes only.

Please feel free to share this with interested parties via email, but
no posting is allowed on web sites. For a free subscription, (and for
free posters) or to update a current subscription, visit
https://www.sans.org/account